Tennessee has recently passed a bill, effective July 1st 2024, declaring it a class-C felony to “recruit, harbor, or transport an unemancipated minor within this state” for transgender healthcare procedures, carrying a sentence of 3-15 years in prison. This applies over state lines and states that do not have anti-extradition laws relating to trans rights can extradite you to Tennessee.

Notably: the bill is vague. This means: telling stories of your own transition, describing your healthcare experiences to an open group chat, describing your trans experiences on a public website, creating trans health guides online, describing how you have gotten DIY HRT, describing anything to do with trans healthcare, even as a cis person, can result in a class-C felony conviction.

Given that being arrested in any capacity for transgender people can be an incredibly dangerous experience (CW: SV), I strongly suggest you begin caring about opsec, stop referring to where you live, use VPNs, stop using apps like Discord, and stop using social media sites that track your IP or user agent fingerprint while unprotected. Remember that for a bill like this to be challenged in court, you have to be arrested first.

Will discuss creating / linking to a transgender matrix chat so that we can help people to move off of things like discord.

  • Muad'Dibber@lemmygrad.ml
    link
    fedilink
    arrow-up
    7
    ·
    3 months ago

    Read the section on NSL’s (national security letters) in the link above. Any US domiciled company must give up it’s data when asked, and it’s illegal for them to tell their users they were forced to do so. The Obama regime admitted to issuing 60 of these every single day, there’s no way Signal isn’t compromised.

    Matrix doesn’t need to be hosted in the US, so they don’t have that problem. Using any US-hosted service is a big no-no.

    • Saoirse [she/her, comrade/them]@hexbear.netM
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      3 months ago

      This is neither new information, nor something overlooked in the design of the software. Thats the point of end to end encryption and open source code: they can only give the data that they have access to, which is the sender, receiver, and timestamps, but we know they cannot decrypt messages in the middle, because it would show in the security implementation in the source code. This model prevents the carrier from knowing the contents of any messages they carry. Therefore, you have to attack one of the end point devices to get the contents, and all the warrants and secret letters in the world can’t compell then to give up the content of your messages, because they do not have the means to do so.

      There are legitimate problems with the security model, like its use of phone numbers as account identifiers, that render it a poor choice for doing Certain Things, but that alone does not prove it was designed as a honeypot, or that it has been secretly compromised in some way that can’t be seen in the source code.